default search action
Evgenia Novikova
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko:
Modelling user notification scenarios in privacy policies. Cybersecur. 7(1): 41 (2024) - [j13]Evgenia Novikova, Elena Fedorchenko, Alexandr Danilov, Igor Saenko:
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security. SN Comput. Sci. 5(4): 373 (2024) - 2023
- [j12]Olga Tushkanova, Dmitry Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko:
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. Algorithms 16(2): 85 (2023) - [j11]Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, Sergey Verevkin:
An Analytical Review of the Source Code Models for Exploit Analysis. Inf. 14(9): 497 (2023) - [j10]Igor V. Kotenko, Elena Fedorchenko, Evgenia Novikova, Ashish Jha:
Cyber Attacker Profiling for Risk Analysis Based on Machine Learning. Sensors 23(4): 2028 (2023) - [c29]Evgenia Novikova, Marat Bukhtiarov, Igor V. Kotenko, Elena Fedorchenko, Igor Saenko:
Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques. IDC 2023: 85-100 - [c28]Igor V. Kotenko, Vasily Desnitsky, Evgenia Novikova:
Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset. IoTaIS 2023: 35-39 - 2022
- [j9]Evgenia Novikova, Elena Doynikova, Sergey Golubev:
Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case. Algorithms 15(4): 104 (2022) - [j8]Elena Fedorchenko, Evgenia Novikova, Anton Shulepov:
Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges. Algorithms 15(7): 247 (2022) - [j7]Sergey Golubev, Evgenia Novikova, Elena Fedorchenko:
Image-Based Approach to Intrusion Detection in Cyber-Physical Objects. Inf. 13(12): 553 (2022) - [j6]Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko, Elena Doynikova:
Privacy Policies of IoT Devices: Collection and Analysis. Sensors 22(5): 1838 (2022) - [j5]Evgenia Novikova, Dmitry Fomichov, Ivan Kholod, Evgeny Filippov:
Analysis of Privacy-Enhancing Technologies in Open-Source Federated Learning Frameworks for Driver Activity Recognition. Sensors 22(8): 2983 (2022) - [c27]Roman Kryukov, Vladimir Zima, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko:
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract). ADIoT 2022: 165-176 - [c26]Sergey Golubev, Evgenia Novikova:
Image-Based Intrusion Detection in Network Traffic. IDC 2022: 51-60 - [c25]Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko:
An approach to formal desription of the user notification scenarios in privacy policies. PDP 2022: 275-282 - 2021
- [j4]Ivan Kholod, Evgeny Yanaki, Dmitry Fomichev, Evgeniy Shalugin, Evgenia Novikova, Evgeny Filippov, Mats Nordlund:
Open-Source Federated Learning Frameworks for IoT: A Comparative Review and Analysis. Sensors 21(1): 167 (2021) - [c24]Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor V. Kotenko:
Security Measuring System for IoT Devices. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 256-275 - [c23]Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor V. Kotenko:
CPE and CVE based Technique for Software Security Risk Assessment. IDAACS 2021: 353-356 - [c22]Anton Shulepov, Evgenia Novikova, Ivan Murenin:
Approach to Anomaly Detection in Cyber-Physical Object Behavior. IDC 2021: 417-426 - [c21]Mikhail Kuznetzov, Evgenia Novikova:
Towards application of text mining techniques to the analysis of the privacy policies. MECO 2021: 1-4 - [c20]Alexey Meleshko, Vasily Desnitsky, Igor V. Kotenko, Evgenia Novikova, Anton Shulepov:
Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System. MECO 2021: 1-4 - 2020
- [j3]Elena Doynikova, Evgenia Novikova, Igor V. Kotenko:
Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects. Inf. 11(3): 168 (2020) - [c19]Elena Doynikova, Evgenia Novikova, Diana Gaifulina, Igor V. Kotenko:
Towards Attacker Attribution for Risk Analysis. CRiSIS 2020: 347-353 - [c18]Evgenia Novikova, Elena Doynikova, Igor V. Kotenko:
P2Onto: Making Privacy Policies Transparent. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 235-252 - [c17]Evgenia Novikova, Mikhail Bestuzhev:
Exploration of the Anomalies in HVAC Data Using Image Similarity Assessment. MECO 2020: 1-4 - [c16]Ivan Murenin, Evgenia Novikova, Roman Ushakov, Ivan Kholod:
Explaining Android Application Authorship Attribution Based on Source Code Analysis. NEW2AN/ruSMART 2020: 43-56 - [c15]Aleksey Malov, Ivan Kholod, Sergey Rodionov, Evgenia Novikova:
Data Mining Algorithms Parallelization in the Framework of Agent-Oriented Programming. NEW2AN/ruSMART 2020: 135-147
2010 – 2019
- 2019
- [c14]Evgenia Novikova, Mikhail Bestuzhev, Igor V. Kotenko:
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 402-418 - [c13]Evgenia Novikova, Mikhail Bestuzhev, Andrey Shorov:
The Visualization-Driven Approach to the Analysis of the HVAC Data. IDC 2019: 547-552 - [c12]Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
An Approach to the Analysis of the Vehicle Movement on the Organization Territory. NEW2AN 2019: 157-167 - [c11]Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
The Location-Centric Approach to Employee's Interaction Pattern Detection. PDP 2019: 373-378 - 2018
- [j2]Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. Secur. Commun. Networks 2018: 2476968:1-2476968:12 (2018) - 2017
- [c10]Evgenia Novikova, Ivan Murenin:
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. MMM-ACNS 2017: 50-61 - 2016
- [c9]Konstantin Borisenko, Andrey Smirnov, Evgenia Novikova, Andrey Shorov:
DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques. ICDM 2016: 197-211 - 2014
- [j1]Evgenia Novikova, Igor V. Kotenko, Evgenii Fedotov:
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services. Int. J. Mob. Comput. Multim. Commun. 6(4): 73-97 (2014) - [c8]Evgenia Novikova, Igor V. Kotenko:
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services. CD-ARES 2014: 63-78 - [c7]Igor V. Kotenko, Evgenia Novikova:
Visualization of Security Metrics for Cyber Situation Awareness. ARES 2014: 506-513 - 2013
- [c6]Igor V. Kotenko, Evgenia Novikova:
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment. CD-ARES Workshops 2013: 345-360 - [c5]Igor V. Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova:
Dynamical Attack Simulation for Security Information and Event Management. IF&GIS 2013: 219-234 - [c4]Evgenia Novikova, Igor V. Kotenko:
Analytical Visualization Techniques for Security Information and Event Management. PDP 2013: 519-525 - [c3]Igor V. Kotenko, Andrey Shorov, Evgenia Novikova:
Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks. PDP 2013: 526-533 - 2012
- [c2]Alexander A. Moldovyan, Nikolay A. Moldovyan, Evgenia Novikova:
Blind 384-bit Digital Signature Scheme. MMM-ACNS 2012: 77-83 - [c1]Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova:
Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012: 391-394
Coauthor Index
aka: Elena Doynikova
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint